Sciweavers

2691 search results - page 388 / 539
» Security in Ad Hoc Networks
Sort
View
ADHOC
2006
100views more  ADHOC 2006»
13 years 10 months ago
Radio range adjustment for energy efficient wireless sensor networks
In wireless ad hoc sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. Topology management schemes su...
Quang Gao, Keith J. Blow, David J. Holding, Ian W....
SIGMOBILE
2008
98views more  SIGMOBILE 2008»
13 years 10 months ago
TraNS: realistic joint traffic and network simulator for VANETs
Realistic simulation is a necessary tool for proper evaluation of newly developed protocols for Vehicular Ad Hoc Networks (VANETs). Several recent efforts focused on achieving thi...
Michal Piórkowski, Maxim Raya, A. Lezama Lu...
IC
2010
13 years 8 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain
INFOCOM
2007
IEEE
14 years 4 months ago
Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks
— Vehicular ad hoc networks using WLAN technology have recently received considerable attention. We present a position-based routing scheme called Connectivity-Aware Routing (CAR...
Valery Naumov, Thomas R. Gross
ADHOCNOW
2003
Springer
14 years 3 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying specific properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...